
Engineer's DNS Intelligence Report
The following DNS record TTLs deviate from recommended values. Incorrect TTLs can cause caching issues, slow propagation, or unnecessary DNS traffic.
| Record Type | Observed TTL | Typical TTL | Severity | Context |
|---|---|---|---|---|
| A | 474s |
1 hour (3600s) |
medium | A TTL is below typical — observed 474s, typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-7 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| AAAA | 241s |
1 hour (3600s) |
high | AAAA TTL is below typical — observed 241s, typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-7 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| CAA | 234s |
1 hour (3600s) |
high | CAA TTL is below typical — observed 234s, typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-7 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| NS | 5594s |
1 day (86400s) |
high | NS TTL is below typical — observed 5594s, typical value is 1 day (86400s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 86400 seconds per NIST SP 800-53 SI-7 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| TXT | 1738s |
1 hour (3600s) |
medium | TXT TTL is below typical — observed 1738s, typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-7 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| SOA | 6 hours (21600s) |
1 hour (3600s) |
high | SOA TTL is above typical — observed 6 hours (21600s), typical value is 1 hour (3600s). Long TTLs reduce DNS query volume but slow propagation when records change. Consider 3600 seconds for a balance of performance and flexibility per NIST SP 800-53 SI-7 relevance guidance. |
Big Picture Questions
- How often do you actually change this record? If it hasn’t changed in months, a short TTL is generating unnecessary DNS queries without any benefit.
- Are you preparing for a migration or IP change? Short TTLs make sense temporarily — but should be raised back to 1 hour (3600s) once the change is complete.
- Every DNS lookup adds 20–150ms of latency. With a 60s TTL, returning visitors trigger a fresh lookup every minute. With 3600s, they get cached responses for an hour — faster page loads, no extra infrastructure needed.
- Google runs A records at ~30s because they operate a global anycast network and need to steer traffic dynamically. For a typical website without that infrastructure, copying those TTLs increases query volume with zero upside.
ns-ext-prod.jackfruit.apple.com
2026030901
dnscontact.apple.com
| Timer | Value | RFC 1912 Range |
|---|---|---|
| Refresh | 300s | 1,200–43,200s (20 min – 12 hrs) |
| Retry | 300s | Fraction of Refresh |
| Expire | 3628800s | 1,209,600–2,419,200s (14–28 days) |
| Minimum (Neg. Cache) | 300s | 300–86,400s (5 min – 1 day) |
| Parameter | Current | Suggested | Severity | Rationale |
|---|---|---|---|---|
| timeout_seconds | 5s |
8s |
low | Average scan duration is 34.4s, suggesting DNS responses are slow for this domain. Increasing timeout from 5s to 8s prevents premature resolution failures. RFC 8767 |
DNSSEC is not enabled for this domain. DNSSEC provides cryptographic authentication of DNS responses, preventing cache poisoning and DNS spoofing attacks.
Your DMARC policy is set to quarantine. Upgrade to p=reject for maximum protection — reject instructs receivers to discard spoofed mail entirely rather than quarantining it.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _dmarc.apple.com (update existing DMARC record) |
| Value | v=DMARC1; p=reject; rua=mailto:dmarc-reports@apple.com |
TLS-RPT (TLS Reporting) sends you reports about TLS connection failures when other servers try to deliver mail to your domain.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _smtp._tls.apple.com (SMTP TLS reporting record) |
| Value | v=TLSRPTv1; rua=mailto:tls-reports@apple.com |
MTA-STS enforces TLS encryption for inbound mail delivery, preventing downgrade attacks on your mail transport.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _mta-sts.apple.com (MTA-STS policy record) |
| Value | v=STSv1; id=apple.com |
Email Security Methodology Can this domain be impersonated by email? Unlikely SPF and DMARC quarantine policy enforced
SPF Record RFC 7208 §4 Verified
SPF valid with industry-standard soft fail (~all), 2/10 lookups
DMARC Policy RFC 7489 §6.3 Verified
